A person on the computer hacking into a system

Penetration Testing

Tokyo Techies can audit your systems with a
penetration test, a simulated cyberattack on a system to spot and fix possible vulnerabilities.
tt heading

Possible
Targets

desktop software
Desktop software
web software
Websites
enterprice
Enterprise
networks
embeded devices
Embedded devices
cloud setups
Cloud
setups
mobile software
Mobile/Web Apps
vlavk box

Black-box
Penetration Testing

box icon

White-box
Penetration Testing

tt heading

Pentest
Content

arrow right
Cross-site scripting
arrow right
Access control issues
arrow right
SQL Injection
arrow right
Privilege extension
arrow right
Cross-site request forgery
arrow right
Problems related to file upload
arrow right
CRLF injection
arrow right
Problems caused by business logic
arrow right
Path traversal
arrow right
Buffer overflow
arrow right
Session fixation
arrow right
Format string attack
arrow right
Weak password policy
arrow right
Code injection
arrow right
Incomplete password reset
arrow right
Encapsulation

Incident Response

Tokyo Techies offers complete support in cyber incident investigation, recovery, and prevention.

In the event of a cyber incident, Tokyo Techies offers complete support in investigating the breach, recovery of data, and building a proper incident response plan to prevent future incidents.
Hacked spelled out surrounded by binary
A person holding up a paper with a cloud shape cut out

Secure Cloud Infrastructure Design

Not sure how to construct a secure cloud infrastructure for a new service? Tokyo Techies can help analyze your new service’s specifications and design the right infrastructure that would meet the service requirements.

Tokyo Techies can also help to analyze your existing cloud system and build an action plan to reconstruct the system without breaking its existing behavior. We can also optimize the running cost/performance while enhancing the security level of the cloud.
tt heading

Common Issues

Security

Existing cloud infrastructure has security issues or requires hire running cost.
HOW WE MAY HELP
  • Analyzing the existing cloud infrastructure
  • Then build an action plan to reconstruct the system without breaking existing its behavior
  • Optimize the running cost/performance while enhancing the security level

Infrastructure

You are not sure how to construct a scalable and secure infrastructure for a new service
HOW WE MAY HELP
  • Analyzing your new service’s specifications
  • Designing a secure infrastructure that meets your requirements
  • For instance:
    • Setup secure Development environment
    • Setup secure CI/CD pipeline
    • Reduce all possible attack surfaces right from design phase

Incident Response Process

arrow down
process 1

Comprehensive Breach Investigation

Using the latest digital forensic techniques and reverse engineering, Tokyo Techies can identify the attack source, spread, and single out the systems and data affected in the breach.

arrow down
process 2

Incident Reporting and Recovery

Based on a thorough investigation, our team can effectively communicate the effects of the breach and assist with short-term and long-term remedies,  to help you resume normal business operations.

arrow down
process icon

Post-Incident Support

Based on the investigation results of the breach, we can help you prepare better to prevent any similar breaches in the future.

Penetration Testing

Bringing Security to Crypto Trading

A Cryptocurrency Exchange Platform
White-box Penetration Testing
VIEW NOW
arrow forward

Summary

The client developed a cryptocurrency exchange platform, with high liquidity as well as plenty of functional features. The Exchange supported both spot and leverage exchange, with a leverage ratio up to 200 times that of Bitmex. Specifically, its Circuit mode was also encrypted in the exchange, together with 2-layer and 3-layer security, hot wallet and cold wallet were made available to serve users’ diverse needs.

Tokyo Techies conducted a comprehensive penetration testing and code review of the client’s system (cloud infrastructure, web, mobile, and blockchain wallet system respectively) in just 14 days and identified all the possible holes that could make the system vulnerable to cyber attacks.

Technologies used

  • owasp logo 1
  • burpsuite
  • python logo
Screen showing a cryptocurrency exchange

SaaS Development

Bringing Japanese Logistics Towards
the Future

MeeTruck (SoftBank Group and Nippon Express Group)
VIEW NOW
arrow forward

Summary

Japanese logistics companies are still relying on legacy systems in their operations, resulting in long and inefficient workflows. To solve this problem, MeeTruck aims to build a nation-wide Transportation Management System (TMS). As their trusted IT partner, Tokyo Techies built a robust and scalable SaaS that is now being used by logistics companies all across Japan as part of digitalizing and simplifying their day-to-day processes.

Technologies used

kubernetes logoTypescript logopython logoAmazon web services logodatadog logoGolang logoTwilio logosalesforce logo
meetruck screenshot

System Migration

Sustaining
Apartment Rental
Services

Oyo Japan and KC Technologies
Technical Due Diligence
VIEW NOW
arrow forward

Summary

Oyo Japan decided to sell its apartment rental brand Oyo Life to KC Technologies. Tokyo Techies took charge in supporting both parties to evaluate the existing infrastructure of the property management platform, addressing all technical challenges, and developing a plan for system migration and maintenance.

Technologies used

kubernetes logojs logopython logoaws logoSwift logoNode JS logoTwilio logo
Oyo Japan sells Oyo Life service to KC Technologies
tt heading

You're in good company.

Request a demo of our solutions, or ask about our services.
Our awesome team is ready to  support you any way you choose.
Tell us about yourself and what you have in mind, and we’ll be in touch in lightning speed.
tick icon
Thank you!
Your form has been successfully received.
We will contact you shortly.
Oops! Something went wrong while submitting the form.

Obtain peace of mind.
Be #Cybersecure.

Download Brochure